rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

  • Upload
    hari

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    1/63

    CHAPTER 1

    INTRODUCTION

    1 EMBEDDED SYSTEM

    An embedded system is acomputersystem with a dedicated function within alarger mechanical or electrical system, often withreal-time computing constraints.t isembedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), isdesigned to be fle ible and to meet a wide range of end-user needs. !mbeddedsystems control many devices in common use today.

    !mbedded systems contain processing cores that are eithermicrocontrollers or digital signal processors ("#P).A processor is an important unit in the embeddedsystem hardware. $t is the heart of the embedded system. !mbedded systems arewidespread in consumer, coo%ing, industrial, commercial and military applications.

    &elecommunications systems employ numerous embedded systems fromtelephone switches for the networ% tomobile phones at the end-user. Computer

    networ%ing uses dedicatedrouters and networ% bridges to route data. !mbeddedsystems are used in transportation, fire safety, safety and security, medicalapplications and life critical systems as these systems can be isolated from hac%ingand thus be more reliable. 'or fire safety, the systems can be designed to have greater ability to handle higher temperatures

    2 COMMON FEATURES OF EMBEDDED SYSTEM

    !mbedded systems are designed to do a specific tas%, unli%egeneral-purpose

    computers .$t does not loo% li%e a computer - there may not be a full monitor ora %eyboard any embedded systems must be able to do things in real-time - in a short

    amount of time (almost instantly from a human view). any embedded systems must be very safe and reliable, especially for medical

    devices oravionicscontrolling airplanes.

    http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Systemhttp://en.wikipedia.org/wiki/Real-time_computinghttp://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/Microcontrollerhttp://en.wikipedia.org/wiki/Digital_signal_processorhttp://en.wikipedia.org/wiki/Telephone_switchhttp://en.wikipedia.org/wiki/Mobile_phonehttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Network_bridgehttp://simple.wikipedia.org/wiki/Computerhttp://simple.wikipedia.org/wiki/Computerhttp://simple.wikipedia.org/wiki/Avionicshttp://en.wikipedia.org/wiki/Systemhttp://en.wikipedia.org/wiki/Real-time_computinghttp://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/Microcontrollerhttp://en.wikipedia.org/wiki/Digital_signal_processorhttp://en.wikipedia.org/wiki/Telephone_switchhttp://en.wikipedia.org/wiki/Mobile_phonehttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Network_bridgehttp://simple.wikipedia.org/wiki/Computerhttp://simple.wikipedia.org/wiki/Computerhttp://simple.wikipedia.org/wiki/Avionicshttp://en.wikipedia.org/wiki/Computer
  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    2/63

    #tarts very uic%ly. People don*t want to wait a minute or two for their car to

    start or emergency e uipment to start. $t uses a special operating system (or sometimes a very small home-made +#)

    that helps meet these re uirements called a real-time operating system, or&+#.

    1.3 APPLICATION AREAS

    &he embedded system mar%et is one of the highest growth areas as there as thessystems are used in very mar%et segment

    consumer electronics office automation industrial automation biomedical engineering wireless communication data communication telecommunication transportation ilitary etc.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    3/63

    CHAPTER-2

    LITERATURE SURVEY

    A literature survey is an evaluative report of information found in the literaturerelated to your selected area of study. &he review should describe, summari eevaluate and clarify this literature. $t should give a theoretical base for the researchand help you (the author) determine the nature of your research. or%s which areirrelevant should be discarded and those which are peripheral should be loo%ed acritically.

    A literature review is more than the search for information, and goes beyond being a descriptiveannotated bibliography. All wor%s included in the review must beread, evaluated and analy ed (which you would do for an annotated bibliography), burelationships between the literature must also be identified and articulated, in relationto your field of research.

    2.1 History

    $t/s generally said that the roots of radio fre uency identification technologycan be traced bac% to orld ar $$. &he 0ermans, 1apanese, Americans and Britishwere all using radarwhich had been discovered in 2345 by #cottish physicist #ir

    obert Ale ander atson- attto warn of approaching planes while they were stillmiles away. &he problem was there was no way to identify which planes belonged tothe enemy and which were a country/s own pilots returning from a mission.

    &he 0ermans discovered that if pilots rolled their planes as they returned to base, it would change the radio signal reflected bac%. &his crude method alerted thradar crew on the ground that these were 0erman planes and not allied aircraft (this is,essentially, the first passive '$" system).

    6nder atson- att, who headed a secret pro7ect, the British developed thefirst active identify friend or foe ($'') system. &hey put a transmitter on each British plane. hen it received signals from radar stations on the ground, it began

    broadcasting a signal bac% that identified the aircraft as friendly. '$" wor%s on this

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    4/63

    same basic concept. A signal is sent to a transponder, which wa%es up and eitherreflects bac% a signal (passive system) or broadcasts a signal(active system).

    2.2 SHORT MESSA E SERVICES

    #hort essage #ervice (# #) is a te t messaging service component of phone, eb, or mobile communication systems. $t uses standardi ed communications protocols to allow fi e line or mobile phone devices to e change short te t messages

    # # was the most widely used data application, with an estimated 4.5 billionactive users, or about 89: of all mobile phone subscribers at the end of ;929. &heterm &hough most # # messages are mobile-to-mobile te t messages, supportfor the service has e panded to include other mobile technologies, such as A?#$C" A networ%s and "igital A P#, as well as satellite and landlinenetwor%s.

    2.3 PROCESS OF SMS

    &he#hort essage #ervice is reali ed by the use of theobile ApplicationPart ( AP) of the ##@ protocol, with #hort essage protocol elements beingtransported across the networ% as fields within the AP messages. &hese APmessages may be transported using *traditional*&" based signaling, or over $Pusing#$0& A? and an appropriate adaptation layer.&he #hort essage protocolitself is defined by 40PP ;4.9 9 for the #hort essage #ervice Point toPoint (# #-PP), and40PP ;4.9 2 for the Cell Broadcast #ervice (CB#).

    'our AP procedures are defined for the control of the #hort essage #ervice

    obile +riginated ( +) short message service transfer.

    http://en.wikipedia.org/wiki/SMShttp://en.wikipedia.org/wiki/SMShttp://en.wikipedia.org/wiki/Mobile_Application_Parthttp://en.wikipedia.org/wiki/Mobile_Application_Parthttp://en.wikipedia.org/wiki/Signaling_System_7http://en.wikipedia.org/wiki/Signaling_System_7http://en.wikipedia.org/wiki/Time-division_multiplexinghttp://en.wikipedia.org/wiki/SIGTRANhttp://www.3gpp.org/ftp/Specs/html-info/23040.htmhttp://www.3gpp.org/ftp/Specs/html-info/23040.htmhttp://www.3gpp.org/ftp/Specs/html-info/23041.htmhttp://en.wikipedia.org/wiki/SMShttp://en.wikipedia.org/wiki/Mobile_Application_Parthttp://en.wikipedia.org/wiki/Mobile_Application_Parthttp://en.wikipedia.org/wiki/Signaling_System_7http://en.wikipedia.org/wiki/Time-division_multiplexinghttp://en.wikipedia.org/wiki/SIGTRANhttp://www.3gpp.org/ftp/Specs/html-info/23040.htmhttp://www.3gpp.org/ftp/Specs/html-info/23041.htm
  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    5/63

    obile &erminated ( &) short message service transfer.

    #hort message alert procedure.

    #hort message waiting data set procedure.

    2.! A"#$%t$&'s $%" Dis$"#$%t$&'s

    adio 're uency $dentification has e isted since the 23 9s but has onlyrecently gained popularity for its uses. $t was first implemented to help the owners olivestoc% %eep trac% of their animal (Bonsor, Deener, E'enlon, n.d.). Presently, '$"systems have developed to the point where they have hundreds of uses, ranging fromtrac%ing luggage at an airport to detailing a patient/s medical history in a hospital.

    2.!.1 A"#$%t$&'s o( RFID T')*%o+o&y

    &he tag does not need to be in line of sight with the receiver to be read

    (compareto a barcode and its optical scanner)

    '$" tags can store a lot of information, and follow instructions

    Fas the ability to pinpoint location

    &echnology is versatile can be smaller than a thumb tac% or can be the si e

    a tablet, depending on its use

    2.!.2 Dis$"#$%t$&'s o( RFID T')*%o+o&y

    Active '$" can be e pensive because of batteries

    &here still needs to be regulations about '$" guidelines

    &here is a privacy concern towards '$" devices, for e ample some claim

    that al- artis infringing on natural rights by overseeing what customers buy

    '$" may be easily intercepted, even if it is !ncrypted

    $t ta%es a lengthy time to program '$" devices

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    6/63

    2., Co%)+ sio%

    &he billion dollar industry that '$" has evolved into has done great good for a lot of different fields. '$" has given doctors the ability for uic% access to patientsrecords, the assurance of accounted merchandise for small business and large ali%eand the government the ability to conduct ta es for tolls in this technological day andage. But with as many benefits as it has, adio 're uency $dentification*soverwhelming credibility is balanced out by the criticism against it. &hough '$"allows for the allocation and distribution of sensitive information, if that informationis compromised, the effects could be devastating. 'or there to be order in the realm of

    '$", legislation and guidelines need to be set up and enforced to ensure the integrityand confidence of the data being communicated, which will in turn help adio're uency $dentifications emerge as more secure and advanced.

    2. S //$ry

    &his chapter is about literature review on how we review and reveal the

    information based on internet, boo%s, articles, and from news papers. #tudy has beenmade from the researches and the inventor before can start our goal.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    7/63

    CHAPTER 3

    PRO0ECT MODULES

    &he G '$" based &raffic control system by using 0# H is implemented byusing various modules given below.

    '$" &echnology

    icro Controller

    Power supply

    0# odem

    I!" $ndicators

    Bu er

    3.1 RFID TECHNOLO Y

    '$" technology consists of the necessary three components &ag, eader andthe Coordinator. adio-fre uencyidentification ( '$") is the wireless non-contact useof radio fre uency electromagnetic field to transfer data, for the purposes of

    automatically identifying and trac%ing tags attached to ob7ects. &he tags contaielectronically stored information. #ome tags are powered by and read at short ranges(a few meters) via magnetic fields (electromagnetic induction), and then act as a passive transponder to emit microwaves or 6F' radiowaves. +thers use a local power source such as a battery, and may operate at hundreds of meters. 6nli%e a bar code,the tag does not necessarily need to be within line of sight of the reader, and may beembedded in the trac%ed ob7ect.

    +ne important feature enabling '$" for trac%ing ob7ects is its capability to provide uni ue identification. +ne possible approach to item identification is the !PC(!lectronic Product Code), pro-viding a standardi ed number in the !PCglobal ?etwor%, with an +b7ect ?ame #ervice (+?#) pro-viding the ade uate $nternetaddresses to access or update instance -specific data. Fowever, currently, +?# cannot be used in a global environment, and since it is a proprietary service, its use isrelatively e pensive, especially for participants with limited resources such as # !s.

    As an alter-native, researchers from the Felsin%i 6niversity have proposed the

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    8/63

    notation $"J6 $, where $" stands for an identity code, and 6 $ stands for acorresponding $nternet address. &his allows several partners to use the system and stiguarantee uni ue identification. &he pro7ect K$dentity -Based &rac%ing and #ervices for # !s/ is currently wor%ing on further development of this concept.

    3.1.1TYPES OF TA S AND READERS

    '$" tags and readers can be grouped under a number of categories. &heir classification is presented in &able 2

    &able 4.2 &ypes of '$" tags

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    9/63

    C+$ssi(i)$tio% o( r'$"'rsBy "'si&% $%" t')*%o+o&y -s'"

    R'$" - only reads data from the tag- usually a micro-controller-based unit with a woundoutput coil,

    pea% detector hardware, comparators, and firmwardesigned totransmit energy to a tag and read information bac% fromit by de-testing the bac%scatter modulation

    - different types for different protocols, fre uencies and

    standards! ist

    R'$" rit' - reads and writes data fromLon the tagBy (i $tio% o( t*' "'#i)'

    St$tio%$ry

    &he device is attached in a fi ed way, for e ample at thentrancegate, respectively at the e it gate of products

    Mo4i+' $n this case the reader is a handy, movable device.T$4+' 3.25C+$ssi(i)$tio% o( RFID t$&s $%"

    r'$"'rs

    3.1.2RFID syst'/s

    '$" systems are closely related to the smart cards described above. Ii%esmart card systems, data is stored on an electronic data-carrying device thetransponder. Fowever, unli%e the smart card, the power supply to the data-carryingdevice and the data e change between the data-carrying device and the reader are

    achieved without the use of galvanic contacts, using instead magnetic or electromagnetic fields. &he underlying technical procedure is drawn from the fields oradio and radar engineering. &he abbreviation '$" stands for radio fre uencyidentification, i.e. information carried by radio waves. "ue to the numerousadvantages of '$" systems compared with other identification systems, '$"systems are now beginning to con uer new mass mar%ets.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    10/63

    D's)ri6tio% o( RFID Syst'/s

    $n a nutshell, '$" involves detecting and identifying a tagged ob7ect throughthe data it transmits. &his re uires a tag (a.%.a. transponder), a reader (a.%.interrogator) and antennae (a.%.a. coupling devices) located at each end of the system&he reader is typically connected to a host computer or other device that has thenecessary intelligence to further process the tag data and ta%e action. &he hoscomputer is often a part of a larger networ% of computers in a business enterprise and

    in some cases, is connected to the $nternet.

    +ne %ey element of operation in '$" is data transfer. $t occurs with theconnection between a tag and a reader, also %nown as coupling, through the antennaon either end.

    &he coupling in most '$" systems is either electromagnetic (bac%scatter) or magnetic (inductive). &he method used in a particular implementation depends on th

    application re uirements, such as the cost, si e, speed, and read range and accuracy'or e ample, inductively coupled '$" systems typically have a short range,measured in inches. &hese types of systems are used mostly in applications, such asaccess control, where short range is advantageous. $n this case a tag only unloc%s a

    '$"-enabled door loc% when it is moved within close range of the reader, not when people who may be carrying a tag in their wallet or purse are wal%ing past the readein a hallway in front of the door.

    &he element that enables the tag and reader communication is the antenna. &hetag and the reader each have its own antenna.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    11/63

    Another important element in an '$" system is the fre uency of operation between the tag and the reader. #pecific fre uency selection is driven by applicationre uirements such as speed, accuracy, and environmental conditions, with standardsand regulations that govern specific applications. 'or e ample, '$" applications for animal tagging have been operating in the 245 %F fre uency band, based onlongstanding regulations and accepted standards.

    Although hardware components are responsible for identifying and capturingdata, software components of an '$" application are responsible for managing andmanipulating the data transmitted between the tag and the reader and between thereader and the host computer.

    '$0 4.2 or%ing of '$" tags

    3.1.3P 4+i) Tr$%s6ort

    Public transportis one of the applications where the greatest potential e ists forthe use of '$" systems

    3.1.!B'%'(its o( RFID syst'/s

    &he replacement of conventional paper tic%ets by a modern electronic faremanagement system based on contactless smart cards provides a multitude of benefitsto all those involved. Although the purchase costs of a contactless smart card systemare still higher than those of a conventional system, the investment should repay itselfwithin a short period. &he superiority of contactless systems is demonstrated by thefollowing benefits for users and operators of public transport companies.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    12/63

    3.1.,B'%'(its (or 6$ss'%&'rs

    Cash is no longer necessary, contactless smart cards can be loaded with largeamounts of money, passengers no longer need to carry the correct change.

    Prepaid contactless smart cards remain valid even if fares are changed.

    &he passenger no longer needs to %now the precise fareM the systeautomatically deducts the correct fare from the card.

    onthly tic%ets can begin on any day of the month. &he period of validity begins after the first deduction from the contactless card.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    13/63

    3.2AT78S,2 MICROCONTROLLER

    &he A&83C5; is a low-power, high-performance C +# 8-bit microcomputer

    with Dbytes of 'lash Programmable and !rasable ead +nly emory (P! + ).&he device is manufactured using Atmel/s high-density non-volatile memorytechnology and is compatible with the industry standard C#-52N instruction set and pin out. &he on-chip 'lash allows the program memory to be reprogrammed in-system or by a conventional non-volatile memory programmer. By combining aversatile 8-bit CP6 with 'lash on a monolithic chip, the Atmel A&83C5; is a powerful microcomputer, which provides a highly fle ible and cost effective solution

    to many embedded control applications.$n 2382, $ntel Corporation introduced an 8 bitmicrocontroller called 8952. &his microcontroller had 2;8 bytes of A , D bytes of chip + , two timers, one serial port, and four ports all on a single chip. At the timeit was also referred as GA #O#&! +? A CF$PH

    3.2.1FEATURES OF MICROCONTROLLER

    ;; Programmable $L+ Iines

    &hree 2=-Bit &imerLCounters

    !ight $nterrupt #ources

    .9 to 5.5 +perating ange'ull "uple 6A & #erial Channel

    atchdog &imer "ual "ata Pointer Power-off 'lag'ast Programming &ime

    'le ible $#P Programming (Byte and Page ode)

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    14/63

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    15/63

    'ig 4.; #chematic of icrocontroller

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    16/63

    3.8 PIN CONFI URATION

    'igure 4.4 pin configuration of A&83#5; microcontroller

    3.2.2Pi% D's)ri6tio%

    VCC

    #upply voltage.

    ND

    0round.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    17/63

    Port 9

    Port 9 is an 8-bit open drain bidirectional $L+ port. As an output port, each pincan sin% eight &&I inputs. hen 2sare written to port 9 pins,the pins can be used ashigh impedance inputs. Port 9 can also be configured to be the multiple ed low orderaddressLdata bus during accesses to e ternal program and data memory. $n this modP9 has internal pull ups. Port 9 also receives the code bytes during 'lash programming and outputs the code bytes during program verification.

    ! ternal pull ups are re uired during program verification.

    Port 1

    Port 2 is an 8-bit bidirectional $L+ port with internal pull ups.&he Port 2 outpu buffers can sin%Lsource four &&I inputs. hen 2s are written to Port 2 pins, they ar pulled high by the internal pull ups and can be used as inputs. As inputs, Port 2 pinsthat are e ternally being pulled low will source current ($$I) because of the interna pull ups. $n addition, P2.9 and P2.2 can be configured to be the timerLcounter e ternal count input (P2.9L&;) and the timerLcounter ; trigger input (P2.2L&;!Qrespectively, as shown in the following table. Port 2 also receives the low-order address bytes during 'lash programming and verification.

    Port 2

    Port ; is an 8-bit bidirectional $L+ port with internal pull ups. &he Port ;output buffers can sin%Lsource four &&I inputs. hen 2s are written to Port ; pins

    they are pulled high by the internal pull ups and can be used as inputs. As inputs, Port

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    18/63

    ; pins that are e ternally being pulled low will source current ($$I) because of theinternal pull ups. Port ; emits the high-order address byte during fetches from e ternal program memory and during accesses to e ternal data memory that use 2=-bitaddresses ( + Q J"P& ). $n this application, Port ; uses strong internal pull-upswhen emitting 2s. "uring accesses to e ternal data memory that use 8-bit addresses( + Q J $), Port ;emits the contents of the P; #pecial 'unction egister. Port ;also receives the high-order address bits and some control signals during 'lash programming and verification.

    Port 3

    Port ; is an 8-bit bidirectional $L+ port with internal pull ups. &he Port ;output buffers can sin%Lsource four &&I inputs. hen 2s are written to Port ; pinsthey are pulled high by the internal pull ups and can be used as inputs. As inputs, Port; pins that are e ternally being pulled low will source current ($$I) because of the pullups. Port ; also serves the functions of various special features of the A&83#5;, asshown in the following table. Port ; also receives some control signals for 'lash programming and verification.

    RST

    eset input. A high on this pin for two machine cycles while the oscillator isrunning resets the device. &his pin drives Figh for 3= oscillator periods after the

    atchdog times out. &he "$# &+ bit in #' A6Q (address 8!F) can be used to

    disable this feature. $n the default state of bit "$# &+, the !#!& F$0F out featureis enabled.ALE PRO Address Iatch !nable (AI!) is an output pulse for latching

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    19/63

    the low byte of the address during accesses to e ternal memory. &his pin is also the program pulse input (P +0) during 'lash programming. $n normal operation, AI! isemitted at a constant rate of2L= the oscillator fre uency and may be used for e terntiming or cloc%ing purposes. ?ote, however, that one AI! pulse is s%ipped duringeach access to e ternal data memory. $f desired, AI! operation can be disabled bysetting bit 9 of #' location 8!F. ith the bit set, AI! is active only during a

    + Q or + C instruction. +therwise, the pin is wea%ly pulled high. #etting theAI!-disable bit has no effect if the microcontroller is in e ternal e ecution mode.

    PSEN

    Program #tore !nable (P#!?) is the read strobe to e ternal program memory.hen the A&83#5; is e ecuting code from e ternal program memory, P#!? is

    activated twice each machine cycle, e cept that two P#!? activations are s%ippedduring each access to e ternal data memory.

    EA VPP

    ! ternal Access !nable. !A must be strapped to 0?" in order to enable thedevice to fetch code from e ternal program memory locations starting at 9999F up to''''F. ?ote, however, that if loc% bit 2 is programmed, !A will be internally latchedon reset. !A should be strapped to CC for internal program e ecutions. &his pin alsoreceives the 2;-volt programming enable voltage( PP) during 'lash programming.

    :TAL1

    $nput to the inverting oscillator amplifier and input to the internal cloc%operating circuit.

    :TAL2

    +utput from the inverting oscillator amplifier.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    20/63

    3.2.3MEMORY OR ANI;ATION

    &he 83C5; micro controller has separate address for program memory anddata memory. &he logical separation of program and data memory allows the datamemory to be accessed by 8-bit address, which can be uic%ly stored and manipulate by an 8-bit CP6. ?evertheless, 2=-bit data memory address can also be generatedthrough the "P& register. Program memory ( + , !P + ) can only be read, notwritten to. &here can be up to = % bytes if program memory the lowest % bytes program are on chip. $n the + less versions, all program memory is e ternal. &heread strobe for e ternal program is the P#!? (program store enable). "ata memory( A ) occupies a separate address space from program memory the lowest 2;8 bytesof data memory are on chip. 6p to = bytes of e ternal A can be addressed in thee ternal data memory space. $n the + less version, the lowest 2;8bytes of datamemory are on chip. &he CP6 generates read and write signals, " and , asneeded during e ternal data memory access.

    ! ternal program memory may be combined if desired by applying the "and P#!? signals to the inputs of an A?" gate and using the output of the gate as theread strobe to the e ternal programLdata memory.

    3.2.!DATA MEMORY

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    21/63

    3.2.,PRO RAM MEMORY

    '$0 4. Program emory

    &he 2;8 byte of A are divided into ; segmentsa). egister ban%s 9 R ; (99 R 2'F)

    b). Bit addressable area (;9F R ;'F) c). #cratch pad area (;9F R 'F)

    $f the #P is initiali ed to this area enough bytes should be left aside to prevent #P datdestruction.

    3.2. SPECIAL FUNCTION RE ISTERS5

    A < B RE ISTERS5

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    22/63

    &hey are used during math and logically operations. &he register A is also usedfor all data transfers between the micro controller and memory. &he B register is useduring multiplication and divided operations. 'or other instructions it can be treatedas another scratch pad register.

    PS= >PRO RAM STATUS =ORD?5

    $t contains math flagsM user flags '9 and register select bits #2 and #9 todetermine the wor%ing register ban%.

    STAC@ AND STAC@ POINTER5

    #tac% is used to hold and retrieve data uic%ly. &he 8 R bit #P is incremente before data is stored during P6#F and CAII e ecutions. hile the stac% may resideany where in on-chip A , the #P is initiali ed to 9 F after the stac% to begin atmanipulated as a 2= R bit register or as two independent 8 R bit registers.

    PC >PRO RAM COUNTER?5

    $t addresses the memory locations that program instructions are to be fetched.$t is the only register that does not have any internal address.

    FLA S5

    &hey are 2Rbit register provided to store the results of certain programinstructions. +ther instructions can test the conditions of the flags and ma%e thedecisions accordingly. &o conveniently address, they are grouped inside the P# andPC+?.&he micro controller has main flags carry(c), au iliary carry (AC), oveflow (+ ), parity (P) and ; general-purpose flags'9, 0'9 and 0'2.

    PORTS

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    23/63

    All ports are bi-directionalM each consists of a latch, an output driver and ainput buffer. P9, P2, P; and P; are the #' latches ports 9, 2, ; and ; respectively.&he main functions of each port are mentioned below.Port9 inputLoutput bus port, address output port and data inputLoutput port.Port1 Suasi-bi-directional inputLoutput port.Port2 Suasi-bi-directional inputLoutput port and address output port.Port2 Suasi-bi-directional inputLoutput port and control inputLoutput pin.

    SBUF >SERIAL BUFFER?

    &he microcontroller has serial transmission circuit that uses #B6' register tohold data. $t is actually two separate registers, a transmit buffer and a receive bufferregister. hen data is moved to #B6', it goes to transmit buffer, where it is held for serial transmission and when it is moved from #B6', it comes from the receive buffer.

    TIMER RE ISTER

    egister pairs (&F9, &I2), (&F2, &I2) are the 2=-bit counter registers for timerLcounters 9 and 2.

    CONTROL RE ISTERS

    #' /s, $P, & +", #C+?, and PC+? contain control and status bits for theinterrupt system, &imersLcounters and the serial port.

    OSCILLATOR AND CLOC@ CIRCUIT

    &his circuit generates the cloc% pulses by which all internal operations aresynchroni ed. 'or the microcontroller to yield standard baud rates, the crystalfre uency is chosen as 22.953 F .

    RESET

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    24/63

    &he reset switch is the #& pin of the microcontroller, which is the input to a#chmitt trigger. $t is accomplished by holding the #& pin F$0F for at least twomachine cycles while the oscillator fre uency is running the CP6 responds bygenerating an internal reset.

    TIMERS COUNTERS

    A micro controller has two 2=- bit &imerLCounter register &9 and &configured to operate either as timers or event counters. &here are no restrictions onthe duty cycle of the e ternal input signal, but it should be for at least one fullmachine to ensure that a given level is sampled at least once before it changes. &imer9 and 2 have four operating modes 2;-bit mode, 2= R bit mode, 8 R bit auto-reloamode. Control bits CLt in & +" #' select the timer or counter function.

    MODE 9

    Both timers in +"!9 are counters with a divide R by R ;; pre-scalar. &hetimer register is configured as a 2; R bit register with all 8 bits of &F2 and the lower

    5-bit of &I2.&he upper ; bits of &I2 are in determinate and should be ignored.#etting the run flags (& 2) doesn/t clear the register or the registers.

    MODE 1

    ode 2 is same as mode 9, e cept that the timer register is run with all 2= bits. &he cloc% is applied to the combined high and low timer registers. An overflow

    occurs on the overflow flag. &he timer continues to count.

    MODE 2

    &his mode configures the timer register as an 8 R bit counter (&I2L9) withautomatic reload. +verflow from &I2L9 not only sets &'2L9, but also reloads &I2Lwith the contents of &F2L9, which is preset by software. &he reload leaves unchange

    MODE 3

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    25/63

    ode 4 is used for application that re uires an e tra 8 R bit timer or counter.&imer 2 in mode 4 simply holds its count. &he effect is same as setting & 9. &imer its mode 4 establishes &I9 and &I2 as two separate counters. &I9 uses the timer9control bits CL&, 0A&!, & 9, $?&9 and &'9. &F9 is loc%ed into a timer function anover the use of & 2 and & ; from timer 2. &hus &F9 controls the timer 2 interrupts

    INTERRUPTS

    &he micro controller provides = interrupt sources, ; e ternal interrupts, ; timer interrupts and a serial port interrupt and a reset. &he e ternal interrupts ($?&9 E$?&2) can each be either level activated or transition activated depending on bits $&

    and $&2 in register &C+?. &he flags that actually generate these interrupts are $!9 E$!2 bits in &C+?.

    &'9 and &'2 generate the timer 9 E 2 interrupts, which are set by a roll over in their respective timerLcounter registers. hen a timer interrupt is generated the on-chip hardware clears the flag that generated it when the service routine is vectored to.&he serial port interrupt is generated by logical + of 2 E &2. ?either of these flagsis cleared by hardware when service routine is vectored to. $n fact, the service routineitself determines whether 2 E &2 generated the interrupt, and the bit is cleared in thesoftware.

    6pon reset, all interrupts are disabled, meaning that none will be responded to by the micro controller if they are activated. &he interrupts must be enabled bysoftware in order for the micro controller to respond to them.

    SERIAL INTERFACE

    &he serial port is full duple , i.e. it can transmit and receive simultaneously. $is also receive buffered which implies it can begin receiving a second byte before a previously byte has been read from the receive register. &he serial port receives andtransmits register and reading #B6' accesses a physically separate receive register.&his serial interface had four modes of operation

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    26/63

    MODE 95

    $n this mode of operation the serial data enters and e ists through Q".&Q"outputs the shift cloc%. !ight data bits are transmittedL received, with the I#B firstthe baud rate is fi ed at 2L2; of the oscillator fre uency. eception is initiali ed by thcondition $-9 and !?T2.

    MODE 15

    $? this mode 29 bits (a start bit 9, 8 data bits with I#B first and a stop bit aretransmitted through &Q" port received through Q". At the receiving end the stop bits goes into B8 in the #' #C+?. &he baud rate is variable.

    MODE 25

    $n the ;, 2= bits (a start bit 9, 8 data bits (I#"B first), a programmable 3thdata bit and a stop bit) are transmitted through &Q" or received through Q". &he baud rate is programmable to either 2L;; or 2L= of the oscillator fre uency

    MODE 35

    &he function of mode ; is same as mode ; e cept that the baud rate isvariable. eception is initiali ed by the incoming start bit if !?T2.

    BAUDRATE CALCULATIONS

    Baud rate in mode 9 is fi ed.ode 9 baud rateToscillator fre uencyL2;

    (2 machine cycleT2; cloc%. cycles)

    &he baud rate in mode ; depends on the value of # +" bit in PC+?

    egister.# +"T9, baud rateT (2L= ) oscillator fre uency.

    # +"T2baud rateT (2L;;) oscillator fre uency.

    $.e. mode ; baud rateT >;(P+ ) # +"L= )U oscillator fre uency.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    27/63

    $n the modes 2 and ;, timer 2 over flow rate and the value of # +"

    determines the baud rate. Baud rate of mode 2 and ; T >(;(P+ ) # +"L;;)U timer 2 over flow rate.

    &he timer 2 interrupt should be disabled in this application.

    3.2., PRO RAM MEMORY LOC@ BITS

    +n the chip are three loc% bits, which can be left un-programmed (u) or can be programmed (p) to obtain the additional features listed in the table below.

    hen loc% bit 2 is programmed, the logic level at the !A pin is sampled andlatched during reset.

    T$4+' 3.35 Pro&r$/ /'/ory +o) s 4its

    $f the device is powered up without a reset, the latch initiali es to a randomvalue, and holds that value until reset is activated. $t is necessary that the latchedvalue of !A be in agreement with the current logic level at that pin in order for thedevice to function

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    28/63

    3.3PO=ER SUPPLY

    Power supply is a reference to a source of electrical power. A device or systemthat supplies electrical or other types of energy to an output load or group of loads iscalled a power supply unit or P#6. &he term is most commonly applied to electricalenergy supplies, less often to mechanical ones, and rarely to others

    &his power supply section is re uired to convert AC signal to "C signal andalso to reduce the amplitude of the signal. &he available voltage signal from the mainis ;49 L59F which is an AC voltage, but the re uired is "C voltage(no fre uency)with the amplitude of V5 and V2; for various applications.

    $n this section we have &ransformer, Bridge rectifier, are connected seriallyand voltage regulators for V5 and V2; ( 895 and 82;) via a capacitor (2999W') in parallel are connected parallel as shown in the circuit diagram below. !ach voltageregulator output is again is connected to the capacitors of values (299W', 29W', 2 W'9.2 W') are connected parallel through which the corresponding output (V5 or V2; )are ta%en into consideration.

    'ig 4.5 #chematic of power supply

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    29/63

    3.3.1Tr$%s(or/'r

    A transformer is a device that transfers electrical energy from one circuit toanother through inductively coupled electrical conductors. A changing current in the

    first circuit (the primary) creates a changing magnetic fieldM in turn, this magnetfield induces a changing voltage in the second circuit (the secondary). By adding aload to the secondary circuit, one can ma%e current flow in the transformer, thustransferring energy from one circuit to the other.

    &he secondary induced voltage #, of an ideal transformer, is scaled from the primary P by a factor e ual to the ratio of the number of turns of wire in their respective windings

    B$si) 6ri%)i6+'

    &he transformer is based on two principles firstly, that an electric current can produce a magnetic field (electromagnetism) and secondly that a changing magneticfield within a coil of wire induces a voltage across the ends of the coil(electromagnetic induction). By changing the current in the primary coil, it changesthe strength of its magnetic fieldM since the changing magnetic field e tends into thsecondary coil, a voltage is induced across the secondary.

    A simplified transformer design is shown below. A current passing through the primary coil creates a magnetic field. &he primary and secondary coils are wrappedaround a core of very high magnetic permeability, such as ironM this ensures that mo

    of the magnetic field lines produced by the primary current are within the iron and

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    30/63

    pass through the secondary coil as well as the primary coil.'ig'

    '$0 4.= &ransformer

    An ideal step-down transformer showing magnetic flux in the core

    I%" )tio% +$

    &he voltage induced across the secondary coil may be calculated from'araday*s law of induction, which states that

    here # is the instantaneous voltage, ?# is the number of turns in thesecondary coil and X e uals the magnetic flu through one turn of the coil. $f th

    turns of the coil are oriented perpendicular to the magnetic field lines, the flu is the

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    31/63

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    32/63

    Pin-coming T $P P T Pout-going T $# #

    giving the ideal transformer e uation

    $f the voltage is increased (stepped up) (V S YV P ), then the current is decreased(stepped down) ( I S Z I P ) by the same factor. &ransformers are efficient so this formula isa reasonable appro imation.

    $f the voltage is increased (stepped up) (V S YV P ), then the current is decreased(stepped down) ( I S Z I P ) by the same factor. &ransformers are efficient so this formula isa reasonable appro imation.

    &he impedance in one circuit is transformed by the square of the turns ratio.'or e ample, if an impedance Z S is attached across the terminals of the secondary coil,it appears to the primary circuit to have an impedance of

    &his relationship is reciprocal, so that the impedance Z P of the primary circuitappears to the secondary to be

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    33/63

    D't$i+'" o6'r$tio%

    &he simplified description above neglects several practical factors, in particular the primary current re uired to establish a magnetic field in the core, andthe contribution to the field due to current in the secondary circuit.

    odels of an ideal transformer typically assume a core of negligiblereluctance with two windings of ero resistance. hen a voltage is applied to the primary winding, a small current flows, driving flu around the magnetic circuit o

    the core. &he current re uired to create the flu is termed the magneti ing currensince the ideal core has been assumed to have near- ero reluctance, the magneti ingcurrent is negligible, although still re uired to create the magnetic field.

    &he changing magnetic field induces an electromotive force (! ') acrosseach winding. #ince the ideal windings have no impedance, they have no associatedvoltage drop, and so the voltages P and # measured at the terminals of thetransformer, are e ual to the corresponding ! 's. &he primary ! ', acting as it doesin opposition to the primary voltage, is sometimes termed the

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    34/63

    hen the input connected at the left corner of the diamond is positive withrespect to the one connected at the right hand corner, current flows to the right alongthe upper colored path to the output, and returns to the input supply via the lower one.

    hen the right hand corner is positive relative to the left hand corner, currentflows along the upper colored path and returns to the supply via the lower colored path.

    $n each case, the upper right output remains positive with respect to the lower

    right one. #ince this is true whether the input is AC or "C, this circuit not only produces "C power when supplied with AC power it also can provide what issometimes called

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    35/63

    terminal component containing the four diodes connected in the bridge configuration became a standard commercial component and is now available with various voltageand current ratings.

    O t6 t s/oot*i%& >Usi%& C$6$)itor?

    'or many applications, especially with single phase AC where the full-wave bridge serves to convert an AC input into a "C output, the addition of a capacitor may be important because the bridge alone supplies an output voltage of fi ed polarity bu

    pulsating magnitude (see diagram above).

    &he function of this capacitor, %nown as a reservoir capacitor (a%a smoothincapacitor) is to lessen the variation in (or *smooth*) the rectified AC output voltagwaveform from the bridge. +ne e planation of *smoothing* is that the capacito provides a low impedance path to the AC component of the output, reducing the ACvoltage across, and AC current through, the resistive load. $n less technical terms, any

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    36/63

    drop in the output voltage and current of the bridge tends to be cancelled by loss ofcharge in the capacitor.

    &his charge flows out as additional current through the load. &hus the changeof load current and voltage is reduced relative to what would occur without thecapacitor. $ncreases of voltage correspondingly store e cess charge in the capacitorthus moderating the change in output voltage L current. Also see rectifier outpusmoothing.

    &he simplified circuit shown has a well deserved reputation for beingdangerous, because, in some applications, the capacitor can retain alethal charge after

    the AC power source is removed. $f supplying a dangerous voltage, a practical circuishould include a reliable way to safely discharge the capacitor. $f the normal load cannot be guaranteed to perform this function, perhaps because it can be disconnected,the circuit should include a bleeder resistor connected as close as practical across thecapacitor. &his resistor should consume a current large enough to discharge thecapacitor in a reasonable time, but small enough to avoid unnecessary power waste.

    Because a bleeder sets a minimum current drain, the regulation of the circuit,defined as percentage voltage change from minimum to ma imum load, is improvedFowever in many cases the improvement is of insignificant magnitude.

    &he capacitor and the load resistance have a typical time constant [ T RC whereC and R are the capacitance and load resistance respectively. As long as theload resistor is large enough so that this time constant is much longer than the time ofone ripple cycle, the above configuration will produce a smoothed "C voltage across

    the load.

    $n some designs, a series resistor at the load side of the capacitor is added. &hesmoothing can then be improved by adding additional stages of capacitorRresistor pairs, often done only for sub-supplies to critical high-gain circuits that tend to besensitive to supply voltage noise.

    &he ideali ed waveforms shown above are seen for both voltage and current

    when the load on the bridge is resistive. hen the load includes a smoothing

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    37/63

    capacitor, both the voltage and the current waveforms will be greatly changed. hilethe voltage is smoothed, as described above, current will flow through the bridge onlyduring the time when the input voltage is greater than the capacitor voltage. 'or e ample, if the load draws an average current of n Amps, and the diodes conduct for29: of the time, the average diode current during conduction must be 29n Amps. &hisnon-sinusoidal current leads to harmonic distortion and a poor power factor in the ACsupply.

    $n a practical circuit, when a capacitor is directly connected to the output of a bridge, the bridge diodes must be si ed to withstand the current surge that occurswhen the power is turned on at the pea% of the AC voltage and the capacitor is fully

    discharged. #ometimes a small series resistor is included before the capacitor to limitthis current, though in most applications the power supply transformer*s resistance ialready sufficient.

    +utput can also be smoothed using a cho%e and second capacitor. &he cho%tends to %eep the current (rather than the voltage) more constant. "ue to the relativelyhigh cost of an effective cho%e compared to a resistor and capacitor this is noemployed in modern e uipment.

    #ome early console radios created the spea%er*s constant field with the currenfrom the high voltage (

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    38/63

    supply, due to their ease of use and relative cheapness. hen specifying individual$Cs within this family, the is replaced with a two-digit number, which indicates thoutput voltage the particular device is designed to provide (for e ample, the 895 hasa 5 volt output, while the 82; produces 2; volts). &he 8 line is positive voltageregulators, meaning that they are designed to produce a voltage that is positiverelative to a common ground. &here is a related line of 3 devices which arcomplementary negative voltage regulators. 8 and 3 $Cs can be used icombination to provide both positive and negative supply voltages in the same circuitif necessary.

    8 $Cs have three terminals and are most commonly found in the &+;;9

    form factor, although smaller surface-mount and larger &r+4 pac%ages are alsoavailable from some manufacturers. &hese devices typically support an input voltagwhich can be anywhere from a couple of volts over the intended output voltage, up toa ma imum of 45 or 9 volts, and can typically provide up to around 2 or 2.5 amps ocurrent (though smaller or larger pac%ages may have a lower or higher current rating)

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    39/63

    3.! SM TECHNOLO Y

    0# is a global system for mobile communication 0# is an internationaldigital cellular telecommunication. &he 0# standard was released by !$(!uropean#tandard &elecommunication #tandard) bac% in 2383. &he first commerciaservices werelaunched in 2332 and after its early introduction in !uropeM the standarwent global in233;. #ince then, 0# has become the most widely adopted andfastest-growing digitalcellular standard, and it is positioned to become the world/sdominant cellular standard.

    &oday/s second-generation 0# networ%s deliver high uality and securemobile voice and data services (such as # #L &e t essaging) with full roamingcapabilities across the world. 0# platform is a hugely successful technology and asunprecedented story of global achievement. $n less than ten years since the first 0#networ% was commercially launched, it become, the world/s leading and fastesgrowing mobile standard, spanning over 2 4 countries. &oday, 0# technology is inuse by more than one in ten of the world/s population and growth continues to sour with the number of subscriber worldwide e pected to surpass one billion by throughend of ;994&oday/s 0# platform is living, growing and evolving and already offersan e panded and feature-rich Kfamily/ of voice and enabling services.

    &he 0lobal #ystem for obile Communication (0# ) networ% is a cellular telecommunication networ% with a versatile architecture complying with the !$0# 399L0# 2899 standard. #iemen/s implementation is the digital cellular mobilecommunication system "399L2899L2399 that uses the very latest technology to meeevery re uirement of the standard.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    40/63

    S.N. P$r$/'t'r S6')i(i)$tio%s

    2 everse Channel fre uency 839-325 F

    ; 'orward Channel fre uency 345-3=9 F

    4 & L 're uency #pacing 5 F

    & L &ime #lot #pacing 4 &ime slots

    5 odulation "ata ate ; 9.844444%bps

    = 'rame Period .=25ms

    6sers per 'rame 8

    8 &ime #lot Period 5 =.3microsec

    3 Bit Period 4.=3; microsecond

    29 odulation 9.4 0 #D

    22 A 'C? ?umber 9 to 2; E 3 5 to 29;4

    2; A 'C? Channel #pacing ;99 %F

    24 $nterleaving 9 ms

    2 oice Coder Bit ate 24. %bps

    &able 4. 0# specification

    0# services follow $#"? guidelines and classified as either teleservices or data

    services. &ele services may be divided into three ma7or categories

    \ &elephone services, include emergency calling and facsimile. 0# alsosupports ideote and &elete , through they are not integral parts of the0# standard.

    \ Bearer services or "ata services, which are limited to layers 2, ; and 4 of

    the +#$ reference model. "ata may be transmitted using either atransparent mode or nontransparent mode.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    41/63

    \ #upplementary $#"? services, are digital in nature, and include calldiversion, closed user group, and caller identification. #upplementaryservices also include the short message service (# #).

    3.!.1 SHORT MESSA E SERVICE

    # # stands for #hort essage #ervice. $t is a technology that enables thesending and receiving of message between mobile phones. # # first appeared in!urope in 233;. $t was included in the 0# (0lobal #ystem for obile

    Communication) standards right at the beginning. Iater it was ported to wirelesstechnologies li%e C" A and &" A. &he 0# and # # standards were originallydeveloped by !$. !$ is the abbreviation for !uropean &elecommunication#tandard $nstitute. ?ow the 40PP (&hird 0eneration Partnership Pro7ect) isresponsible for the development and maintenance of the 0# and # # standards.

    +ne # # message can contain at most 2 9 bytes (22;9 bits) of data, so one

    # # message can contain up to

    \ 2=9 characters if -bit character encoding is used. ( -bit character encoding issuitable for encoding Iatin characters li%e !nglish alphabets.)

    \ 9 characters if 2=-bit 6nicode 6C#; character encoding is used. (# # te tmessages containing non-Iatin characters li%e Chinese character should use

    2=-bit character encoding.)

    +nce the message is sent the message is received by # #C, which must thenget it to the appropriate mobile device. &o do this the # #C sends a # # re uest toFome Iocation egister (FI ) to find the roaming customer. +nce FI receives there uest, it responds to the # #C with the subscriber/s status

    2 $nactive or active; here subscriber is roaming.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    42/63

    $f the response is GinactiveG, then the # #C will hold onto the message for a period of time. hen the subscriber access his device, the FI sends a # #notification to the # #C and the # #C will attempt delivery.

    &he # #C transfer the message in a #hort essage "elivery Point to Pointformat to the serving system. &he system pages the device, and if it responds, themessage gets delivered. &he # #C receives verification that the message wasreceived by the end user, then categori es the message as GsentH and will not attempto send again.

    # # provides a mechanism for transmitting short message to and fromwireless devices. &he service ma%es use of an # #C, which acts as a store andforward system for short messages.

    +ne ma7or advantage of # # is that it is supported by 299: 0# mobile phones. Almost all subscription plans provided by wireless carriers includeine pensive # # messaging service.

    3.!.2 S*ort M'ss$&' S'r#i)' C'%t'r >SMSC?

    # #C is a combination of hardware and software responsible for the relayingand storing and forwarding of short message between an # ! and mobile device.

    &he # #C must have high reliability, subscriber capacity, and message

    throughput. $n addition, the system should be easily scalable to accommodate growingdemand for # # in the networ%.

    ?ormally, an $?-based solution will allow for a lower entry cost compared to point solutions because it can support other applications on single hardware platformand share resources, thereby spreading the deployment cost over several services andapplications.

    Another factor to be considered is the ease of operation and maintenance of

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    43/63

    the application, as well as the fle ibility to activate new services and upgrade to newsoftware releases.

    ?epal has two mobile companies\ ?epal telecommunication\ #pice ?epal Pvt.Itd.

    3.!.3 S*ort M'ss$&' P''r to P''r Proto)o+

    &he short message peer to peer protocol (# PP) is a protocol for e changing# # messages between # # peer entities such as message service centers. $t is often

    used to allow third parties (e.g. content suppliers li%e news organi ations) to submmessages, often in bul%.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    44/63

    3.,LI HT EMITTIN DIODE

    A +i&*t-'/itti%& "io"' (LED ) is a two-lead semiconductor light source thatresembles a basic P?-7unction diode, e cept that an I!" also emits light. hen an I!"*s

    anode lead has a voltage that is more positive than its cathode lead by at least the I!"*sforward voltage drop, currentflows. !lectrons are able to recombine with holes within thedevice, releasing energy in the form of photons. &his effect is called electroluminescencand the color of the light (corresponding to the energy of the photon) is determined by thenergy band gap of the semiconductor.

    An I!" is often small in area (less than 2 mm; ), and integrated opticalcomponents may be used to shape its radiation pattern.

    Appearing as practical electronic components in 23=;, the earliest I!"s emittedlowintensity infrared light. $nfrared I!"s are still fre uently used as transmittingelements in remote-control circuits, such as those in remote controls for a wide variety oconsumer electronics. &he first visible-light I!"s were also of low intensity, and limitedto red. odern I!"s are available across the visible,ultraviolet, and infraredwavelengths,with very high brightness.

    !arly I!"s were often used as indicator lamps for electronic devices, replacingsmall incandescent bulbs. &hey were soon pac%aged into numeric readouts in the forof seven-segment displays, and were commonly seen in digital cloc%s.

    ecent developments in I!"s permit them to be used in environmental and tas% lighting. I!"s have many advantages over incandescent light sources including lower energy consumption, longer lifetime, improved physical robustness, smaller si e, an

    faster switching. Iight-emitting diodes are now used in applications as diverse as aviationlighting, automotive headlamps, advertising,general lighting, traffic signals, and camerflashes. Fowever, I!"s powerful enough for room lighting are still relatively e pensive,and re uire more precise current and heat management than compact fluorescenlamp sources of comparable output.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    45/63

    I!"s have allowed new te t, video displays, and sensors to be developed, whiletheir high switching rates are also useful in advanced communications technology.

    'ig 4. I!"

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    46/63

    3. BU;;ER

    A bu er or beeper is anaudio signaling device, which maymechanical, electro-mechanical, or pie oelectric. &ypical uses of bu ers and beepers includealarmdevices, timers and confirmation of user input such as a mouse clic% or %eystro%e.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    47/63

    '$0 4.3 Bu er

    CHAPTER-!

    IMPLEMENTATION OF PRO0ECT

    !.1 INTRODUCTION

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    48/63

    &he pro7ect is implemented using '$" technology and 8952 icro controller.&his paper suggests building a '$" system using 8952 icro controller that can identifya particular vehicle in traffic as well as identify traffic density and act accordingly tocontrol the traffic. Automatic detection of vehicle can be used to provide useful estimateof the density of traffic from one place to another leading to proper and controlled flow otraffic. $n case of metropolitan cities of $ndia the traffic sometimes goes out of controleading to 7ams thus people have to face inconvenience while travelling. adio 're uenc$dentification ( '$") tags has been proposed to be used in this pro7ect. !ach vehiclewould be attached with a '$" card with them. As soon as they enter into the range of reader the tag would automatically get read and the traffic light would act accordingly fo proper traffic flow and in case of instructing a vehicle individually an audio device woul

    be attached to it. &he data will be stored and processed in the processor attached to th'$" reader. !ven the government is planning to tag every vehicle which gets into the

    road for security purposes your cars will be tagged.

    !.1.1 SI NIFICANCE

    &he ministry of heavy industries is considering a proposal to ma%e it mandatorto fit '$"-enabled devices in the cars manufactured in $ndia. $t is believed that '$"

    tags would help in traffic management as traffic violations by motorists could be trac%eand all violations identified. Also, motorists would get charged automatically as soon athey enter a toll area. &he ministry of urban development has already discussed a similaagenda with many states. &he ministry has proposed a ]core area charge for differen

    cities to reduce traffic congestion in the city/s nerve center. #o, people could end up paying a special levy to drive into Connaught Circus, the heart of the Capital. 8952 icrocontroller is used in this field because it/s one of the powerful controllers which aremending for such embedded wor%s. oad fatalities are a ma7or concern in the developworld. ecent studies show that a third of the number of fatal or serious accidents areassociated with e cessive or inappropriate speed, as well as changes in the roadway (li%the presence of road-wor% or une pected obstacles). #o this system even can catch hosuch vehicles which drive at in appropriate speed.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    49/63

    !.1.2 O4 ')ti#'s

    &o develop the short message services (# #) systems received by the control

    room and contain information about the vehicle information. &o develop the vehicle monitoring system database for vehicle detection

    connected with '$" tags.

    !.2 HARD=ARE COMPONENTS

    '$" &echnologyicrocontroller

    Power #upply

    0# odem

    I!" $ndicators

    Bu er

    !.3 SOFT=ARE COMPONENTS

    D!$I #oftware 'or C Programming! press PCB 'or Iayout "esign! press #CF 'or #chematic "esign

    !.! BLOC@ DIA RAM

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    50/63

    &o integrate and testing the # # system and vehicle monitoring system

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    51/63

    !., SCHEMATIC DIA RAM

    Fi& !.1 S)*'/$ti) Di$&r$/

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    52/63

    !. ADVANTA ES

    2. &he system is easy to understand.;. Avoids the collision of vehicle by controlling the speed.

    4. !asy to set up the system.. ?o direct Iine of #ight re uired for identification E trac%ing.

    5. !nables very specific detection of vehicles.

    =. #imultaneous multiple detection of vehicles are possible using '$".

    . ?o performance degradation during harsh weather.

    !. APPLICATIONS ?ormally, this type of system is useful in case of emergency areas where traffic is

    main concern E little carelessness may cause accident E death may occur. #pecially, thisis useful in following applications.

    2. At school gates;. $n hospital premises.4. $? AII#

    . &ollgates and '$"5. Cellular &owers=. $mage Processing

    . #atellite and 0P#8. Cartel3. 0ate

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    53/63

    CHAPTER ,

    RESULT

    &he basic operation of this pro7ect to protect the traffic rules from the humanwhose violating the traffic rules. &he process implementing this pro7ect some componenare used in this pro7ect such as 8952 microcontroller, '$" system, I!" indicators, bu er, etc.

    All the components are connected to the 8952 microcontroller based on the pinconfiguration as shown in schematic diagram. &he wor%ing of each and evercomponents are internally depends on another component or module.

    'ig 5.2 Pro7ect Dit

    ,.1 OPERATION

    &he pro7ect %it mainly operating on the microcontroller. All the modules ancomponents are connected to the bread board. !ach and every component and modules

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    54/63

    have their own wor% but they internally connected to the microcontroller and follow thinstructions of 8925. $n this pro7ect configuration power supply gives the dc power to t%it. All the modules are wor%ing on the based programmer coding.

    ,.2 =OR@IN

    'ig 5.; or%ing of '$"

    &his %it is generally used in the traffic signals, it operates based on the wor%ing of traf

    signal lights. henever the red light indication is on then the '$" reader starts wor%ingand it release the magnetic field , at that time whenever any vehicle cross the indicatedline '$" reader reads the vehicle information through the '$" tags which areconnected to the vehicle. $mmediately the '$" reader reads that and send theinformation of the vehicle to the nearest control room or ne t 7unction by using 0#modem. &hen the authori ed persons able to caught the vehicle.

    By using this process we can able to control the traffic violation and reduce the

    number of traffic polices for controlling the traffic, we can use them for anotherimportant wor%. &his is not only for using vehicle detecting but also we can use for sommore applications li%e speed control of vehicles, student attendance managemenoffices ,toll ta es, etc.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    55/63

    CONCLUSION

    &he designed system gives the complete solution over the problem of trafficspecially in case of school areas where parents vehicle or privatevehicles are coming fo

    dropping or pic%ing up their children or students with the help of designed system speeof vehicle is %ept in tolerable range by the indication of the signal so that traffic is neatdrived and ultimately vehicle collision is avoided which is leading to ero chances oaccidents. &he designed system is also intended for sending a message through dedicated mobile to the student/s parents by %eeping record of their entrance or leavintime of school which ma%es parents tension free those who are not able to dropped o pic%ed up from school. &his system is also useful for especially in case of dummstudents because the special '$" tag is provided to each student so without verifying the

    '$" tag students are not able to enter in the school campus.

    $n short this system is very useful for controlling the speed of vehicle Eultimately avoidance of collision with in-out information of the student to their parents.

    FUTURE SCOPE

    &hough, the system is well designed still it has limitation of distance or areacoverage. &his problem can be solved using the module of igbee. 'or wirelesstransmission igbee is the best solution that can replace e isting ' trans receiver. $naddition to this, signal indication i.e. !"E O!II+ signals may be replace wirelesslyinstead of wired.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    56/63

    BIBLIO RAPHY

    2. http LLen.wi%ipedia.orgLwi%iL adio-fre uency^identification;. http LLwww.%eil.comLboo%sL8952boo%s.asp4. en.wi%ipedia.orgLwi%iL0#

    . en.wi%ipedia.orgLwi%iLIight-emitting^diode5. www.technopundits.inLfinal-year-pro7ectsL

    =. Drause, B., von Altroc%, C., Po ybill, . $ntelligent Fighway by 'u y IogicCongestion "etection and &raffic Control on ulti-Iane oads ith ariable oad

    #igns. Proceedings of !6'$&_3=, Aachen, 0ermany, 233=

    . Cherrett, &., aterson, B. And mcdonald, . (;995) emote automatic $ncidentdetection using inductive loops. Proceedings of the $nstitution of Civil !ngineers&ransport, 258, (4), 2 3-255.

    8.Palubins%as, 0., Dur , '., and einart , P., ;993. &raffic congestion Parameterestimation in time series of airborne optical remote #ensing images. $n Proc. +f$#P # Fannover or%shop ;993 - Figh esolution !arth $maging forgeospatial$nformation, ;-5 1une, ;993, Fannover, 0ermany, $#P #.

    3. Palubins%as, 0intautas and Dur , 'ran and einart , Peter (;998) "etection oftrafficcongestion in optical remote sensing imagery. $n $nternational 0eoscienceand emote #ensing #ymposium. $!!!. $0A ##98, ;998-9 -9= - ;998-9 -22,Boston,6#A.

    29.P. Pongpaibool, P. &angamchit and D. ?oodwong,

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    57/63

    APPENDI:

    PRO RAMMIN MICROCONTROLLER

    A compiler for a high level language helps to reduce production time. &o programthe A&83#5; microcontroller the DeilWv4 is used. &he programming is done strictly the embedded C language. DeilWv4 is a suite of e ecutable, open source softwadevelopment tools for the microcontrollers hosted on the indows platform.

    &he compilation of the C program converts it into machine language file (.he )&his is the only language the microcontroller will understand, because it contains th

    original program code converted into a he adecimal format. "uring this step there aresome warnings about eventual errors in the program. &his is shown in 'ig 5.2. $f therare no errors and warnings then run the program, the system performs all the re uiretas%s and behaves as e pected the software developed. $f not, the whole procedure whave to be repeated again. 'ig 5.; shows e pected outputs for given inputs when runcompiled program.

    +ne of the difficulties of programming microcontrollers is the limited amount ofresources the programmer has to deal with. $n personal computers resources such a

    A and processing speed are basically limitless when compared to microcontrollers. $ncontrast, the code on microcontrollers should be as low on resources as possible.

    @'i+ Co/6i+'r5

    Deil compiler is software used where the machine language code is written and

    compiled. After compilation, the machine source code is converted into he code whicis to be dumped into the microcontroller for further processing. Deil compiler alsosupports C language code.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    58/63

    Fi& 15 Co/6i+$tio% o( so r)' Co"'

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    59/63

    Fi& 25 R % t*' )o/6i+'" 6ro&r$/

    Pro+o$"5

    Proload is software which accepts only he files. +nce the machine code isconverted into he code, that he code has to be dumped into the microcontroller and th

    is done by the Proload. Proload is a programmer which itself contains a microcontrollein it other than the one which is to be programmed. &his microcontroller has a program it written in such a way that it accepts the he file from the Deil compiler and dumps thihe file into the microcontroller which is to be programmed. As the Proload programme%it re uires power supply to be operated, this power supply is given from the pow

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    60/63

    supply circuit designed above. $t should be noted that this programmer %it contains power supply section in the board itself but in order to switch on that power supply, asource is re uired. &hus this is accomplished from the power supply board with an outpof 2;volts.

    Fi& 35 At/'+ AT78C29,1 D'#i)' 6ro&r$//'r

    F'$t r's

    #upports ma7or Atmel 83 series devices

    Auto $dentify connected hardware and devices

    !rror chec%ing and verification in-built

    Ioc% of programs in chip supported to prevent program copying

    ;9 and 9 pin `$' soc%et on-board

    Auto !rase before writing and Auto erify after writing

    $nformative status bar and access to latest programmed file

    #imple and !asy to use

    or%s on 5 =99 speed

    D's)ri6tio%

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    61/63

    $t is simple to use and low cost, yet powerful flash microcontroller programmefor the Atmel 83 series. $t will Program, ead and erify Code "ata, rite Ioc% Bits,!rase and Blan% Chec%. All fuse and loc% bits are programmable. &his programmer intelligent onboard firmware and connects to the serial port. $t can be used with any typof computer and re uires no special hardware. All that is needed is a serialcommunication ports which all computers have.

    All devices have signature bytes that the programmer reads to automaticallyidentify the chip. ?o need to select the device type, 7ust plug it in and go All devices alshave a number of loc% bits to provide various levels of software and programmin protection. &hese loc% bits are fully programmable using this programmer. Ioc% bits a

    useful to protect the program to be read bac% from microcontroller only allowing erase reprogram the microcontroller. &he programmer connects to a host computer using standard #;4; serial port. All the programming *intelligence* is built into the programmer so you do not need any special hardware to run it. Programmer comes witwindow based software for easy programming of the devices.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    62/63

    Pro&r$//i%& So(t $r'

    Computer side software calledPro+o$" V!.1 is e ecuted that accepts the $ntelF!Q format file generated from compiler to be sent to target microcontroller. $t autodetects the hardwareconnected to the serial port. It also auto detects thechip inserted and bytes used. So t!are is de"eloped in #elphi 7 and

    re$uires no o"erhead o any e%ternal #&&.

  • 7/25/2019 rfidbasedtrafficcontrollerusinggsm-140417232013-phpapp02

    63/63

    Fi& !5 =riti%& t*' 6ro&r$/s 4yt's o%to t*' /i)ro)o%tro++'r